Robustness of keystroke-dynamics based biometrics against synthetic forgeries

نویسندگان

  • Deian Stefan
  • Xiaokui Shu
  • Danfeng Yao
چکیده

Biometric systems including keystroke-dynamics based authentication have been well studied in the literature. The attack model in biometrics typically considers impersonation attempts launched by human imposters. However, this attack model is not adequate, as advanced attackers may utilize programs to forge data. In this paper, we consider the effects of synthetic forgery attacks in the context of biometric authentication systems. Our study is performed in a concrete keystroke-dynamic authentication system. The main focus of our work is evaluating the security of keystroke-dynamics authentication against synthetic forgery attacks. Our analysis is performed in a remote authentication framework called TUBA that we design and implement for monitoring a user’s typing patterns. We evaluate the robustness of TUBA through experimental evaluation including two series of simulated bots. The keystroke sequences forged by the two bots are modeled using first-order Markov chains. Support vector machine is used for classification. Our results, based on 20 users’ keystroke data, are reported. Our work shows that keystroke dynamics is robust against the two specific types of synthetic forgery attacks studied, where attacker draws statistical samples from a pool of available keystroke dataset other

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital Fingerprinting Based on Keystroke Dynamics

Digital fingerprinting is an important but still challenging aspect of network forensics. This paper introduces an effective way to identify an attacker based on a strong behavioral biometric. We introduce a new passive digital fingerprinting technique based on keystroke dynamics biometrics. The technique is based on free text detection and analysis of keystroke dynamics. It allows building a b...

متن کامل

Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords

Keystroke dynamics is a viable and practical way as an addition to security for identity verification. It can be combined with password authentication resulting in a more secure verification system. This paper presents a new profiling approach of individuals based on soft biometrics for keystroke dynamics. Soft biometrics traits are physical, behavioural or biological human characteristics, whi...

متن کامل

B2C Internet Authentication method using Statistical Keystroke Biometrics

This paper is focused on biometric user authentication on the Internet using keystroke dynamics. This work describes the advantages of using keystroke biometrics in B2C Internet applications, and also it shows the problems and techniques related to sampling the typing pattern in the Internet. This research work is presented applied to a real experimental system that implements a keystroke dynam...

متن کامل

Keystroke dynamics

This article is an introduction to keystroke dynamics. Keystroke dynamics is a biometric which is based on assumption that people type in uniquely characteristic manners. Keystroke dynamics is mainly used for verification, but also identification is possible. Also commercial products exist. Additionally, keystroke dynamics can be used to eavesdrop secure communications by guessing what was writ...

متن کامل

Detecting Computer Intrusions Using Behavioral Biometrics

In this paper we introduce the idea of using behavioral biometrics in intrusion detection applications. We present a new biometrics-based technique, which can be used to detect intrusion without the need for any special hardware implementation and without forcing the user to perform any special actions. The technique is based on using “keystroke dynamics” and “mouse dynamics” biometrics. We dis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2012